PRISMA HACKERCAMP

Prisma CSI is launching a new training program with its “Prisma Hacker Camp”, which will last a week of experience over many years and is equipped with real-life scenarios.

Contrary to traditional theoretical training, thanks to the training laboratory prepared by the leakage testing team, students will have the opportunity to practice the theoretical knowledge they learn with plenty of practice. In addition to the training that will take place, the participants will be expecting research and assignments. After a full week of full-time attendance, the efficiency will be high.

This training provides important content for people who want to work on cyber security, make a career and improve themselves.

For information about tuition fees, or if you have any questions , you can contact us at [email protected] .

Training Calendar
1. Day Cyber Security Essentials and Basic Linux Training
2. Day Linux System Administration and Security
3. Day Network Security – 1
4. Day Network Security – 2
5. Day Web Application Security – 1
6. Day Web Application Security – 2
7. Day CTF
Content
  • What is GNU / Linux?
  • Media Setup
  • Meeting with the Terminal
  • Editors
  • Most Basic Commands
  • File Structure
  • User Management
  • Group Management
  • Authority Management
  • Package Systems
  • Service Management
  • Application Management
  • Scheduled Tasks
  • Network Configuration
  • Logging Mechanisms
  • Basic Firewall Settings
  • Basic Security Configurations
linux
  • Intelligence Definitions
  • Analysis Steps
  • Open Source Intelligence
  • Open Source Data Collection Techniques
  • Open Source Data Collection Tools
search
  • Penetration Test Principles
  • Information Collection Methods
  • Security Vulnerabilities and Discovery Methods
  • Introducing Favorite Tools
  • Introducing Metasploit
  • Exploitation Phase
  • Post Exploitation Phase
  • Security Systems and Bypass Methods
  • Exercises
  • Reporting
firewall
  • Web Technologies
  • Web Application Security Basics
  • Working Structure of HTTP Protocol
  • Passive Data Collection Methods
  • Active Data Collection Methods
  • Web Application Vulnerabilities
  • OWASP TOP 10
    • Injection(SQL, NoSQL, OS, LDAP etc.)
    • Broken Authentication
    • Sensitive Data Exposure
    • XML External Entities (XXE)
    • Broken Access Control
    • Security Misconfiguration
    • Cross-Site Scripting (XSS)
    • Insecure Deserialization
    • Using Components with Known Vulnerabilities
    • Insufficient Logging&Monitoring
  • Burp Suite
  • Web vulnerability Scanning Tools
  • WAF / IPS / IDS Bypass Techniques
  • Exercises
  • Reporting
malware

Etkinlik Takvimi

January 5, 2019
Ankara